Technologies

What is a Mesh Network? The Definitive Guide 2022

A Mesh network is a group of devices connected to each other, for example, an IoT gateway that acts as one single network in your room, mesh network is multiple sources of connectivity not just a gateway. Since the 1960s, network technology has developed rapidly. Traditional LAN has 6 types of application structures, such as providing structure, type structure, other type structures, and so on. They operate on a global scale, providing data technology and a lot of stability. Today, we will introduce the technology of mesh networks in detail for you.

1. What is mesh networking technology

The development of network technology has brought huge changes to human society. It has made communication easier for people, more convenient for information transmission, and even contributed to the technological revolution and industrial upgrading. The development of the network from the early wired network and military network to the current wireless network and wide area network has greatly reduced the communication cost between people. Network technology allows people to instantly know the world’s affairs to global trading and trading, and truly realizes the equality of global information exchange. However, the path chosen by the traditional local area network technology in the development process seems to have certain bottlenecks and limitations today due to technical limitations. The way to solve this problem is to “return to the original intention” and move toward the Mesh network, that is, the mesh network structure.

2. What is an IoT Mesh Network?

Mesh network is a local network topology method. It combines the use of infrastructure nodes (such as Bridges, devices, and switches) that are directly, dynamically, and non-hierarchically connected to efficiently move data to and from clients. This sort of network topology guarantee that no single node relies on data transfer. Thus, if a node fails, the network can “repair itself” and reroute data using algorithms like “shortest path bridging” (SPB), which are described in the IEEE 802.1aq standard. This makes mesh networks more reliable when connectivity is Paramount and some nodes malfunction or get destabilized.

A mesh network will use flooding, or routing, a technique that usually comes with one kind of data. With the flooding method, each incoming packet is delivered over every available outgoing connection, except the connection arriving from it. Using routing techniques, data hops around other nodes until it reaches its destination, and then is sent to its location. The mesh network then configures itself to ensure that continuous connections are allowed and data is re-routed around unavailable paths. Again, this allows the network to attain the standard of dependability and elasticity that is desperately needed by organizations wishing to take advantage of low consumption, low-data-rate IoT applications.

3. How Does a Mesh network Work?

At present SIG MESH adopts the MESH network technology built on the flooding protocol.

The Mesh network consists of Mobile Phone and Node, where Mobile is a smartphone and serves as the control end of the Mesh network.

Node is a node device in the network. The BLE Mesh network is implemented by broadcasting. The basic steps are:

• a. Send control or read data from the mobile terminal to node A.

• b. The message is broadcast by node A.

• c. When node B receives the message from node A, it broadcasts the message from node A.

• d. By analogy, use the infection method to spread the message from ten to ten, so that all devices within the wireless range can receive this message.

MESH will also perform special encryption on the data in the network to prevent the theft of network data using monitoring and man-in-the-middle attacks.

4. Mesh Network Architecture

Basic Network Topology

The basic structure of the local area network includes tree structure, bus structure, star structure, distributed structure, and so on. The star structure is the most widely used now. The advantages of this structure are high punctuality rate, simple structure, and easy management. Its disadvantages are low reliability and higher cost than other structures. The star structure takes the middle and node as the center point, and other nodes are connected to this center point. The bus-type structure has a relatively simple structure and strong expansibility, but it has the disadvantages of being difficult to maintain and difficult to find faults in the branch structure. The bus-type structure has no obvious center, and each network device is attached to a bus. For safer and more efficient use, at present, the vast majority of commercial LANs in operation adopts a combination of a variety of network topology patterns to ensure maximum performance of the LAN and avoid obstacles.

Typical Mesh (mesh network) structure

When it comes to Mesh, it means “net”, “Mesh” or “Mesh”. It’s very simple. From the basic meaning of Mesh, the topology of a mesh network is as follows: all network nodes in it are connected one by one to form a complete network, and one node is connected to at least one more node. In the era of a limited network, it is very difficult to realize the network with a Mesh layout based on the network cable. In the wireless era, without the constraints of network cables and the use of various new technologies, the layout of wireless Mesh networks is relatively simple.

5. Wireless technology in mesh networks

Multi-channel negotiation

When Wireless Mesh Network Accesses all kinds of Channels, the MP nodes in the network can only listen to one channel once. On behalf of using more channels, the nodes must dynamically toggle between the different channels available. This requires a coordination mechanism to ensure two communication channels. All nodes work on the same channel. One way to handle this is to partition the timeline into beacon separations, at the beginning of each beacon separation, build a time window called ATIM, and require that at the beginning of the ATIM time window, all nodes in the network are forced to toggle to the same channel. In the ATIM window, the node that has data to send uses the control message to negotiate the channel with the receiver.

Channel assignment

Channel allocation technology is largely applied to the management and use of more channels in a multi-channel wireless Mesh network. While ensuring good network connectivity, it reduces the probability of channel conflict in the Mesh network and improves network efficiency. Unlike the multi-channel negotiation technology, Channel allocation technology is to allocate multiple channels in a mesh network from the direction of channel frequency resource division. For example, one set of channels is defined for interconnection between MPs, and another set of channels is defined for interconnection between MAP and MeshSTA. Group division is a commonly used wireless Mesh network channel allocation scheme. It partitions all neighboring nodes of arbitrarily MP nodes into batches, and then appoints

channels to each batch uniformly; the channels allocated to each group are selected within the node clash neighborhood. The least used channel is assigned and the interconnection between groups is guaranteed.

Network discovery

Network discovery technology is mainly used for discovering new nodes and neighbor nodes in the Mesh network and establishing corresponding information lists. Network discovery is largely performed by means of list maintenance and network scanning. Network scanning means that MP nodes in the wireless Mesh network monitor their surrounding neighbor nodes by actively sending or monitoring Beacon signals, while list maintenance is to pass the network. The information of the neighbor nodes belonging to the same Mesh network found by scanning is added to the list. If the adjacent node is found to be new, then the entire network can use the routing table to discover it.

Route forwarding

Mesh connections and pathfinding determine many technical features and advantages of wireless mesh networks. The utilization efficiency of mesh connections in Mesh networks and the performance of the network depend on the design of routing and forwarding. When designing a wireless Mesh network routing protocol, it should be noted that, first of all, routing should not be based only on the “minimum hop count”, but should comprehensively consider a variety of performance metrics and make routing selections after a comprehensive evaluation. Secondly, network fault tolerance should be provided. and strong support can promptly choose a fungible network to avoid interruption of service provision when the wireless network finishes. Thirdly, it is necessary to be able to use traffic engineering technology to perform load balancing among several roads and maximize the use of system resources. Fourthly, it is required to support MP and MeshSTA at the same time. Commonly used wireless Mesh routing protocols can refer to the routing protocols of the AdHoc network. Several typical routing protocols include Dynamic Source Routing Protocol (DSR), Destination Sequence Distance Vector Routing Protocol (DSDV), Temporary Order Routing Algorithm (TORA), and Ad Hoc On-demand Distance Vector Routing Protocol (AODV), etc. DSR is the most common peer-to-peer topology-based reactive self-organizing routing protocol, which is characterized by adopting an active caching strategy and extracting topology information from source routing, and creating routes through comparison.

Mesh security

The single-feature multi-hop access point of Mesh itself is to realize its unique security, to organize the management and implementation of a Mesh from the network; each target and area of ​​Mesh nodes; Disability protection. Mesh security technology was proposed to solve these security problems.

In order to solve these security problems in a targeted manner, Mesh security technology is proposed.

6. Application examples of mesh network technology

• Battlefield communication: Wireless ad hoc network is the preferred technology for digital battlefield communication due to its characteristics of no network facilities, rapid deployment, and strong robustness. It can be used on the battlefield to complete tasks such as friendly force and equipment monitoring, enemy force and terrain reconnaissance, war damage assessment, positioning and tracking, and biochemical attack detection; fleet battle groups that require communication can also be established through mobile ad hoc networks. communication without having to rely on terrestrial or satellite communication systems. In addition to wars, peacetimes also use wireless sensor networks to detect enemy intrusions through the classification and analysis of sound and vibration signals, so as to carry out national security protection.

• Emergency communications: After disasters such as earthquakes, floods, and severe tropical storms. Fixed communication network facilities may be destroyed or fail to work normally. For emergency rescue and disaster education, a wireless ad hoc network, a network technology that can be quickly deployed without relying on any fixed network facilities, is needed.

• Environmental monitoring: In network scenarios such as wildlife protection, soil monitoring, and atmospheric monitoring, there are problems such as a large number of nodes, a wide variety of data types, a huge amount of data, and a vast monitoring area. Multiple monitoring nodes form a wireless self-organizing network to achieve the purpose of constructing a large-area autonomous network at low cost and then connecting to the public network through a gateway to monitor the environment without laying and maintaining a large number of infrastructures.

• Space development: It is an impossible task to fully cover the infrastructure in space. The existing satellite communication methods have poor scalability and cannot meet the bandwidth requirements of civilian services on a large scale. Through the wireless self-organizing network between nodes, combined with the store-carry-forward opportunistic routing mode, the mobile communication function in the process of universe development is realized.

• Industrial field: In the fields of coal mines and petrochemicals with flammable and explosive problems, wireless sensor networks can be used to collect data in dangerous environments, and abnormal alarms can be detected at any time, thereby improving the response accuracy and speed of dangerous situations and reducing casualties. . In addition, in the field of modern manufacturing, workers from production lines to complex machinery and equipment are trying to install corresponding sensor nodes, so as to keep abreast of the working health of the equipment, detect problems early and deal with them in time, thereby effectively reducing losses and accidents. incidence.

• Medical field: Sensor networks in wireless ad hoc networks also have certain applications in medical and health care. Such as the doctor provides great convenience.

7. Mesh network Pros and Cons

Node interconnection: Each of these nodes in the local area network is concatenated one by one to present an obvious decentralized situation, and each node is connected to at least two other nodes. The APS all consisted of wireless relay links in a peer-to-peer manner, expanding the wireless “hot spots” in orthodox WLANs into wireless “hot pints” that really achieve a large area of coverage.

Self-configuration: The APs in the wireless mesh network make network management and maintenance easier through their own auto-configuration and central management capabilities.

Self-healing The AP in the wireless mesh network provides other paths through its own functions of automatic discovery and winter routing connection to solve the impact of a single fault on services.

High Bandwidth: It expands the wireless “hot spot” in the traditional WLAN to the wireless “hot spot” that really covers a large area, and upgrades the original because of the increase in WLAN distance and slow broadband speed. In addition, using the Mesh structure system, the signal can avoid the interference of obstacles in the blind area and transmit the signal smoothly.

• High utilization rate: In a single-hop network, a fixed AP is connected and used by many devices, and the AP’s communication network availability is inversely proportional to the number of network devices. In a Mesh network, the problem that the AP’s communication network availability declines will not occur. Because any node of the Mesh network is an AP, if the availability of one of the AP communication networks is not available, the data will automatically reconnect to the new AP.

Compatibility: Mesh adopts standard 802.11b/g/n/ac format, which is broadly compatible with wireless client terminals.

8. Is mesh network better than WiFi?

Wireless Mesh Network, also called a “multi-hop” network, is a new-type wireless network technology that is totally unlike orthodox wireless networks, Wireless mesh network is a new type of network structure. Multi-hop routing and point-to-point network technology are the basis of wireless mesh. It has the peculiarities of mobile broadband. In addition, it is capable of extending itself dynamically, self-balancing, self-healing, self-managing, and self-organizing networks. Wireless Mesh is more advanced than Wi-Fi in terms of networking method, mobility, and transmission distance, and it also has the characteristics of Wi-Fi.

Therefore, the wireless Mesh network can provide Wi-Fi with help to increase the transmission distance and mobility, and provide great help in expanding Wi-Fi applications. In addition, based on the current popular application of terminals, wireless Mesh can be rapidly promoted by wireless Mesh. Therefore, wireless Mesh networks and Wi-Fi are compatible and complementary to each other.

In an orthodox wireless area local network (WLAN), if a user wants to communicate, he must first connect to a fixed connect point (AP), and each user must link to the wireless line joined to the AP to access the network. Jump network. In contrast, any wireless device node in the wireless Mesh network can play the role of router and AP at the same time. One-to-one or one-to-many direct communication is possible between each node, and each node can transmit and receive signals.

9. The development history of mesh network technology

In 2001, Inter and other manufacturers first proposed the Mesh wireless network architecture, which was mainly used as the internal network of the US military at the beginning of the experiment.

In 2003, Nortel Networks launched a point-to-point WiFi plus Mesh ad hoc network architecture and plans to combine it with traditional telecom networks to form a complementary seamless roaming network in the future.

Since 2004, Mesh wireless ad hoc networks have been used in the construction of broadband metropolitan area networks, especially in the new “wireless broadband cities” and multi-network integration construction in recent years.

A mesh ad hoc network is a kind of wireless local area network, that is, a mesh structure network, also known as a “mulTI-hop” network. In a Mesh network, all nodes are connected to one of them, each node has multiple connection channels, and all nodes form a holistic network, a technology that dynamically creates new links to connect with other nodes, it has networking. Its advantages include scalability, simple and convenient networking, and so on. Based on these advantages, it can greatly reduce the cost and complexity of network deployment for users.

Wood

Startup in Marketing, He covers IoT, including Hardware, Firmware, and Software.

Share
Published by
Wood

Recent Posts

What is Smart Supply Chain? Values Solutions, and Applications.

The rapid development of modern logistics has promoted the evolution of smart supply chains. The…

2 years ago

IoT Fleet Management Guide 2023

An IoT fleet management enables fleet operators to automate various processes, collect important data, learn…

2 years ago

Top 6 IoT Challenges and How to Fix them

The Internet of Things is one of the most popular technologies in today's technological revolution…

2 years ago

What is IoT Security & Privacy Issues?

IoT deployment raises a number of IoT security issues related to IoT device features, such as the…

2 years ago

What is Indoor Positioning System and How Does it Works?

The indoor positioning system allows managers to pinpoint the location of people or assets accurately,…

2 years ago

What is a Smart Security System

Smart security allows you to customize, monitor, and manage your security systems anywhere and at…

2 years ago